General
-
Target
hwidspoofer.exe
-
Size
75.4MB
-
Sample
241204-s5pybsvphj
-
MD5
eb0cf1a95ffd1d314b96ccb0136bf748
-
SHA1
dbaff8d30e9fb023550f89fbba7784ca5e3ab9ff
-
SHA256
f82c91241d92db6e4b9843dcee5e164d13ec25903827fe80cb9848acb1a4e745
-
SHA512
ee31550d5da75e0f5ac164f7c3283012d2a9991f146f8090ae3c55d0cecbc6b0a375448175248c9e15aea1c09ea2e05558ba978e058a7ec7175f24165b4b9cfa
-
SSDEEP
1572864:Y08VlFW2omcSk8IpG7V+VPhqerE7WoclKTiY4MHHLeqPNLtDYN0sZsfV0:7KTxomcSkB05awehocMEMHVLtUN0s0
Behavioral task
behavioral1
Sample
hwidspoofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
hwidspoofer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
hwidspoofer.exe
-
Size
75.4MB
-
MD5
eb0cf1a95ffd1d314b96ccb0136bf748
-
SHA1
dbaff8d30e9fb023550f89fbba7784ca5e3ab9ff
-
SHA256
f82c91241d92db6e4b9843dcee5e164d13ec25903827fe80cb9848acb1a4e745
-
SHA512
ee31550d5da75e0f5ac164f7c3283012d2a9991f146f8090ae3c55d0cecbc6b0a375448175248c9e15aea1c09ea2e05558ba978e058a7ec7175f24165b4b9cfa
-
SSDEEP
1572864:Y08VlFW2omcSk8IpG7V+VPhqerE7WoclKTiY4MHHLeqPNLtDYN0sZsfV0:7KTxomcSkB05awehocMEMHVLtUN0s0
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-